CISA
16
Aug
2023

CISA warns of critical Citrix ShareFile flaw exploited in the wild

CISA is warning that a critical Citrix ShareFile secure file transfer vulnerability tracked as CVE-2023-24489 is being targeted by unknown…

SA Power Networks seeks $314m ICT budget
16
Aug
2023

SA Power Networks seeks $314m ICT budget – Strategy

SA Power Networks is hoping to spend $314 million on ICT for the 2025-2030 regulatory period, around $30 million less…

Protecting Your Business from Email Compromise: Essential Security Measures
16
Aug
2023

Protecting Your Business from Email Compromise: Essential Security Measures

Grant Warkins, Director, Technical Advisor Services, MOXFIVE In today’s digital landscape, businesses face an ever-increasing risk of email compromise, which can…

Continuous Security Testing Is The Key To Strengthening Your Cybersecurity
16
Aug
2023

Continuous Security Testing Is The Key To Strengthening Your Cybersecurity

If you’re only conducting snapshot in time security tests, you aren’t doing enough to protect your business. By Erik Holmes,…

Massive phishing campaign using QR codes targets energy sectorSecurity Affairs
16
Aug
2023

Massive phishing campaign using QR codes targets energy sectorSecurity Affairs

A phishing campaign employing QR codes targeted a leading energy company in the US, cybersecurity firm Cofense reported. Starting from…

Google
16
Aug
2023

Google released first quantum-resilient FIDO2 key implementation

Google has announced the first open-source quantum resilient FIDO2 security key implementation, which uses a unique ECC/Dilithium hybrid signature schema…

New Hacking Attack Targeting LinkedIn Accounts Worldwide
16
Aug
2023

New Hacking Attack Targeting LinkedIn Accounts Worldwide

An ongoing campaign has resulted in the compromise of multiple LinkedIn accounts. However, the motive behind this campaign remains unclear…

How social media compromises information security
16
Aug
2023

ProxyNation: The dark nexus between proxy apps and malware

[ This article was originally published here ] Executive summary AT&T Alien Labs researchers recently discovered a massive campaign of…

How social media compromises information security
16
Aug
2023

Stories from the SOC – Unveiling the stealthy tactics of Aukill malware

[ This article was originally published here ] Executive summary On April 21st, 2023, AT&T Managed Extended Detection and Response (MXDR)…

AI is the most hyped technology of 2023
16
Aug
2023

AI is the most hyped technology of 2023

There is little surprise that Gartner’s latest research on emerging technology shows that generative AI is reaching a peak in…

LinkedIn account hacks increased in the past couple of weeks
16
Aug
2023

LinkedIn account hacks increased in the past couple of weeks

LinkedIn users are advised to prioritize enhancing the security of their accounts, given recent incidents in which several individuals in…

Number of women in tech dipped last quarter, ONS data shows
16
Aug
2023

Number of women in tech dipped last quarter, ONS data shows

The number of women in the UK’s technology sector declined between the first and second quarters of the year, according…